The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Anti Counterfeiting Technologies EE126 Computer Engineering Clifford C Youn.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
The Consumer World of. You’ve seen it before…  Books  Digital Media  Computer Hardware  Other high value items.
Risk of Using RFID chips in Passports Oscar Mendez.
Radio-Frequency Identification (RFID) Andrew Bowdle MD, PhD Professor of Anesthesiology and Pharmaceutics Chief of the Division of Cardiothoracic Anesthesiology.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
RFID Cardinality Estimation with Blocker Tags
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID passports How does is work? Step by step By: Einav Mimram.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
RFID Implementation in IIT Madras: A Case Study Dr. Harish Chandra Librarian Indian Institute of Technology Madras URL:
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
Developing RFID Application In Supply Chain
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
RFID Tags: Privacy and Security without Cryptography Ari Juels RFID-Privacy Workshop at MIT 15 November 2003.
Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
RFID: Automating Weapons Management David P. Sandrowitz Senior Associate Sytex Inc.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Optimization Schemes for Protective Jamming Swaminathan Sankararaman(Duke) Karim Abu-Affash(Ben Gurion University, Israel) Alon Efrat (me)(U Arizona, USA)
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Presented by Sharan Dhanala
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
TAG CAR Karthick Singaram Arun Magesh. Problem Statement In Bangalore during the recent survey average of 2000 vehicle per day is violating traffic rules.
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University,
RFID SECURITY.
RFID Lynsey Charles Kyle Jahnke Andrew Kangerga Jake Whitesides
RFID A technology I advocate, despite the disadvantages Will cover what it is, how it’s used, its advantages, and its bad side.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Radio Frequency Identification
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID (Radio-Frequency Identification)
Presentation transcript:

The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications Security, pp ACM Press Presented by: Sean Mondesire

3/30/2006The Blocker Tag2 Contributions o Blocker Tags: o Protects consumer privacy o Relatively inexpensive o Proves the RFID Bill of Rights and practical tags can coexist

3/30/2006The Blocker Tag3 Agenda o RFID Tags o Security Issues o Previous Work o Blocker Tags Privacy Protection Malicious Blocker Tags o Critique

3/30/2006The Blocker Tag4 RFID Tags o Simple Radio-Frequency Identification Tags Passive: Battery-less Contain an assigned serial number Can be modified o Replacement for the barcode Cost about 5 cents No more laser scanning Consumers can use the benefits

3/30/2006The Blocker Tag5 Security Issues o Eavesdroppers Gather what items are in your possession Privacy Violation Examples o Dress size o Medication o Amount of money in wallets o Petty Thieves Modify serial numbers in store Deactivate tags before purchase

3/30/2006The Blocker Tag6 Previous Work o “Kill Tag” o Faraday Cage o Active Jamming o “Smart” RFID Tags Hash-Locks Re-encryption

3/30/2006The Blocker Tag7 Tree-Walking Singulation o Singulation Reader processes one tag at a time o Tree-Walking Singulation Algorithm Recursively signal tags with next prefix Tag with prefix respond with next prefix

3/30/2006The Blocker Tag8 Blocker Tags o Goal: o Protect the privacy of consumers affordably o Motivation: o Guaranteed privacy will push the use of RFID tags o How They Work o Universal Blocker: For every signal send 0 and 1 o Selective Blocker: Block a subset of tags

3/30/2006The Blocker Tag9 Privacy Protection Tool o Selective Blocker: Forces readers to signal nonexistent and existent tags Readers cannot guarantee tags are in the vicinity Hides tags with false signals o Supermarket Example: Shelved items start with 0 Purchased items tags set to 1 Sticker of a blocker tag placed on item’s tag (blocks 1’s)

3/30/2006The Blocker Tag10 Malicious Blocker Tags o Blocker tags that do not respect the privacy zones Blocker signaling 0’s in previous example o Universal blockers are malicious o DOS attacks on readers Universal blockers: Readers signal all possible serial numbers Selective blockers: Simulate actual tags that should not be scanned at that time

3/30/2006The Blocker Tag11 Strengths o Inexpensive RFID to reply to signals Less than 10 cents to manufacture o Satisfies the RFID Bill of Rights o Simple to implement Create tag that returns 0 or 1 when ever signaled

3/30/2006The Blocker Tag12 Weaknesses o Can force DOS on reader Encourages nonsense broadcasts o Requires additional RFID tags Forces consumers to have blocker tags to guarantee privacy o Many unanswered questions: What if malicious blocker tags were left throughout a store? Thieves can swap tags easier than barcodes

3/30/2006The Blocker Tag13 Areas of Improvement o Improve inefficiencies placed on the Reader Universal Blocker impractical Limit blocking capabilities o Incorporate blockers within each tag Cost for addition registers should be comparable to having separate blockers

3/30/2006The Blocker Tag14 Related Work o RSA Laboratories Inventors of RSA public-key cryptosystem Focus on RFID privacy and security o Soft Blocking o Encryption in RFID o RFID chips can carry a virus Amsterdam’s Free University RFIDs can return data to infect a reader’s DB Can spread to other tags

3/30/2006The Blocker Tag15 Contributions o Protects consumer privacy Readers can’t pinpoint existing tags o Relatively inexpensive About 5 cents for one antennae At most 10 cents per blocker o Proves the RFID Bill of Rights and practical tags can coexist No sacrifices on consumer rights

3/30/2006The Blocker Tag16 References o Juels, A., Rivest, R. L., and M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” 8th ACM Conference on Computer and Communications Security, pp ACM Press o Reuters, “Scientists: RFID Chips Can Carry a Virus”, us.reut/index.html, CNN.com, March 15, 2006 o RSA Laboratories, March 28, 2006.